### $Id: $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com
### $Id: lgserver_multi.rb 10909 2010-11-04 23:59:56Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on
### $Id: ms10_xxx_ie_css_clip.rb 10912 2010-11-05 00:08:55Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more informat
### $Id: webster_http.rb 10887 2010-11-03 12:19:19Z patrickw $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information o
### $Id: pgp_keyserver7.rb 10908 2010-11-04 23:50:35Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on
1.Description: The avipbb.sys kernel driver distributed with Avira Premium Security Suite contains a race condition vulnerability in the handling paramaters of NtCreatekey function. Exploitation of this issue allows an attacker to crash system(make
### $Id: coldfusion_fckeditor.rb 10874 2010-11-02 23:51:17Z mc $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information
### $Id: adobe_flashplayer_button.rb 10857 2010-11-01 22:34:13Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more info
# Exploit Title: Quickzip 5.1.8.1 Denial of Service Vulnerability # Date: 2010/11/02 # Author: moigai # e-mail: again.liu@gmail.com # Version: 5.1.8.1 # Tested on: Windows XP SP3 En (VM) # Greetz to: Yoji my $file = boom.zip; my $localHeader = x50
/* # Exploit Title: AVG Internet Security 0day Local DoS Exploit # Date: 2010-11-01 # Author: Nikita Tarakanov (CISS Research Team) # Software Link: http://www.avg.com # Version: up to date, version 9.0.851, avgtdix.sys version 9.0.0.832 # Tested on